Explore topic-wise InterviewSolutions in ISRO.

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your ISRO knowledge and support exam preparation. Choose a topic below to get started.

1.

We can make a class abstract by(A) Declaring it abstract using the virtual keyword(B) Making at least one member function as virtual function(C) Making at least one member function as pure virtual function(D) Making all member function const

Answer»
2.

Which of the following need not necessarily be saved on a Context Switch between processes?(A) General purpose registers(B) Translation look-aside buffer(C) Program counter(D) Stack pointer

Answer»
3.

Which of the following need not necessarily be saved on a context switch between processes?(A) General purpose registers(B) Translation look-aside buffer(C) Program counter(D) All of the above

Answer»
4.

Raid configurations of the disks are used to provide(A) Fault-tolerance(B) High speed(C) High data density(D) A & B

Answer»
5.

How many 2-input multiplexers are required to construct a 210-input multiplexer?(A) 1023(B) 31(C) 10(D) 127

Answer»
6.

If (12x)3 = (123)x, then the value of x is(A) 3(B) 3 or 4(C) 2(D) None of these

Answer» None
7.

If N2 = (7601)8 where N is a positive integer, then the value of N is(A) (241)5(B) (143)6(C) (165)7(D) (39)16

Answer»
8.

In the given network of AND and OR gates, f can be written as(A) X0X1X2 … Xn + X1X2 … Xn + X2X3 … Xn + ⋯ + Xn(B) X0X1 + X2X3 + … Xn-1 Xn(C) X0 + X1 + X2 + … + Xn(D) X0X1 + X3 … Xn−1 + X2X3 + X5 … Xn−1 + ⋯ + Xn−2Xn−1 + Xn

Answer»
9.

The Boolean theorem AB + A’C + BC = AB + A’C corresponds to(A) (A + B) ∙ (A’ + C) ∙ (B + C) = (A + B) ∙ (A’ + C)(B) AB + A’C + BC = AB + BC(C) AB + A’C + BC = (A + B) ∙ ( A ‘+ C) ∙ (B + C)(D) (A + B) ∙ (A’ + C) ∙ (B + C) = AB + A’C

Answer»
10.

What is the bandwidth of the signal that ranges from 40 kHz to 4 MHz(A) 36 MHz(B) 360 kHz(C) 3.96 MHz(D) 396 kHz

Answer»
11.

A computer uses 8 digit mantissa and 2 digit exponent. If a = 0.052 and b = 28E + 11 then b + a – b will(A) result in an overflow error(B) result in an underflow error(C) be 0(D) be 5.28 E + 11

Answer» None
12.

The Boolean expression ( A + C’)(B’+ C’) simplifies to(A) C’ + AB’(B) C’ (A’ + B)(C) B’C’ + AB’(D) None of these.

Answer» None
13.

In the expression A'(A’ + B’) by writing the first term A as A + 0, the expression is best simplified as(A) A + AB(B) AB(C) A’(D) A + B

Answer» None
14.

Which one of the following algorithm design techniques is used in finding all pairs of shortest distances in a graph?(A) Dynamic programming(B) Backtracking(C) Greedy(D) Divide and Conquer

Answer»
15.

Which of the following architecture is/are not suitable for realising SIMD?(A) Vector processor(B) Array processor(C) Von Neumann(D) All of the above

Answer»
16.

Four jobs to be executed on a single processor system arrive at time 0 in the order A, B, C, D . Their burst CPU time requirements are 4, 1, 8, 1 time units respectively. The completion time of A under round robin scheduling with time slice of one time unit is(A) 10(B) 4(C) 8(D) 9

Answer»
17.

The logic operations of two combinational circuits in Figure-I and Figure-II are(A) entirely different(B) identical(C) complementary(D) dual

Answer» None
18.

Consider the following code segmentfor (int k=0; k<20; k=k+2){if (k % 3 == 1)system.out.print(k+ " ")}What is printed as a result of executing the code segment?(A) 4 16(B) 4 10 16(C) 0 6 12 18(D) 1 4 7 10 13 16 19

Answer» None
19.

More than one word are put in one cache block to(A) exploit the temporal locality of reference in a program(B) exploit the spatial locality of reference in a program(C) reduce the miss penalty(D) none of these

Answer»
20.

The Memory Address Register(A) is a hardware memory device which denotes the location of the current instruction being executed.(B) is a group of electrical circuit, that performs the intent of instructions fetched from memory(C) contains the address of the memory location that is to be read from or stored into(D) contains a copy of the designated memory location specified by the MAR after a “read” or the new contents of the memory prior to a “write”

Answer»
21.

If the two matriceshave the same determinant, then the value of x is(A) 1/2(B) √2(C) ± 1/2(D) ± 1/√2

Answer» None
22.

The device which is used to connect a peripheral to bus is known as(A) control register(B) interface(C) communication protocol(D) none of these

Answer»
23.

If a square matrix A satisfies AT = I, then the matrix, A is(A) Idempotent(B) Symmetric(C) Orthogonal(D) Hermitian

Answer» None
24.

Consider the graph shown in the figure below:Which of the following is a valid strong component?(A) a, c, d(B) a, b, d(C) b, c, d(D) a, b, c

Answer»
25.

The maximum number of edges in a n-node undirected graph without self loops is(A) n2(B) n * (n-1)/2(C) n – 1(D) (n + 1) * n/2

Answer»
26.

The circuit shown in the following figure realizes the function(A) ( ( A + B )’ + C ) ( D’ E’ )(B) ( ( A + B)’ + C)(D E’ )(C) ( A + ( B + C )’) ( D’E )(D) (A + B + C’ )( D’ E’)

Answer» None
27.

The Boolean expression Y = (A + B’ + A’B)C’ is given by(A) AC’(B) BC’(C) C’(D) AB

Answer» None
28.

The minimum number of fields with each node of doubly linked list is(A) 1(B) 2(C) 3(D) 4

Answer»
29.

Which of the following operations is performed more efficiently by doubly linked list than by linear linked list?(A) Deleting a node whose location is given(B) Searching an unsorted list for a given item(C) Inserting a node after the node with a given location(D) Traversing the list to process each node

Answer»
30.

The time required to search an element in a linked list of length n is(A) O (log n)(B) O (n)(C) O (1)(D) O(n2)

Answer»
31.

The TCP sliding window(A) can be used to control the flow of information(B) always occurs when the field value is 0(C) always occurs when the field value is 1(D) occurs horizontally

Answer»
32.

Fork is(A) the creation of a new job(B) the dispatching of a task(C) increasing the priority of a task(D) the creation of a new process

Answer»
33.

What is the name of the operating system that reads and reacts in terms of operating system?(A) Batch system(B) Quick response time(C) real time system(D) Time sharing system

Answer»
34.

A public key encryption system(A) allows anyone to decode the transmissions(B) allows only the correct sender to decode the data(C) allows only the correct receiver to decode the data(D) does not encode the data before transmitting it

Answer»
35.

Overlaying(A) requires use of a loader(B) allows larger programs, but requires more effort(C) is most used on large computers(D) is transparent to the user

Answer»
36.

In which of the following four necessary conditions for deadlock processes claim exclusive control of the resources they require?(A) no preemption(B) mutual exclusion(C) circular wait(D) hold and wait

Answer»
37.

A critical section is a program segment(A) which should run in a certain amount of time(B) which avoids deadlocks(C) where shared resources are accessed(D) which must be enclosed by a pair of semaphore operations P and V

Answer»